Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-08 Thread Kevin Fenzi
On Fri, Apr 08, 2022 at 08:54:02PM +0200, Vitaly Zaitsev via devel wrote: > On 08/04/2022 19:30, Kevin Fenzi wrote: > > We actually had IMA signing all up and running last year from jan 15th > > to jan 22nd. As luck would have it, there was a chromium build in that > > time: > > Now try with

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-08 Thread Vitaly Zaitsev via devel
On 01/04/2022 15:33, Ben Cotton wrote: We want to add signatures to individual files that are part of shipped RPMs. Can you try signing the breeze-icon-theme and distribution-gpg-keys packages and post %time output? -- Sincerely, Vitaly Zaitsev (vit...@easycoding.org)

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-08 Thread Vitaly Zaitsev via devel
On 08/04/2022 19:30, Kevin Fenzi wrote: We actually had IMA signing all up and running last year from jan 15th to jan 22nd. As luck would have it, there was a chromium build in that time: Now try with texlive. -- Sincerely, Vitaly Zaitsev (vit...@easycoding.org)

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-08 Thread Kevin Fenzi
On Fri, Apr 08, 2022 at 12:20:00AM +0200, Fabio Valentini wrote: > On Thu, Apr 7, 2022 at 11:51 PM Peter Robinson wrote: > > > > > > There are plenty of things in an RPM build that already inherently take > > > > O(N) time in the number of files or the total size of the files, even > > > >

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-08 Thread Vitaly Zaitsev via devel
On 07/04/2022 23:50, Peter Robinson wrote: Why do you classify that slow down being due to signing? Because all build packages are stuck in the "signing pending" status. You can't do anything with them until the sign process is complete. -- Sincerely, Vitaly Zaitsev

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-07 Thread Rahul Sundaram
Hi On Thu, Apr 7, 2022 at 5:33 PM Matthew Miller wrote: > > I don't think we should characterize the Changes process in this way. > Fedora > is a place for experimentation, and if a proposal is rejected, it is > totally > appropriate to adjust that proposal based on feedback and re-submit. >

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-07 Thread Fabio Valentini
On Thu, Apr 7, 2022 at 11:51 PM Peter Robinson wrote: > > > > There are plenty of things in an RPM build that already inherently take > > > O(N) time in the number of files or the total size of the files, even > > > ignoring %build and %install. > > > > Yes, but signing is an extremely slow

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-07 Thread Peter Robinson
> > There are plenty of things in an RPM build that already inherently take > > O(N) time in the number of files or the total size of the files, even > > ignoring %build and %install. > > Yes, but signing is an extremely slow process. Rebuilding the texlive > package during the Mass rebuild slows

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-07 Thread Matthew Miller
On Sun, Apr 03, 2022 at 12:03:58PM +0200, Vitaly Zaitsev via devel wrote: > >We want to add signatures to individual files that are part of shipped RPMs. > Third attempt to push it through again? It was already rejected by FESCo. I don't think we should characterize the Changes process in this

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-05 Thread Vitaly Zaitsev via devel
On 05/04/2022 13:12, Ben Beasley wrote: There are plenty of things in an RPM build that already inherently take O(N) time in the number of files or the total size of the files, even ignoring %build and %install. Yes, but signing is an extremely slow process. Rebuilding the texlive package

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-05 Thread Ben Beasley
I have no idea whether or not this Change would add significantly to package build times in practice. It’s a good question. I think answering it would require benchmarks rather than asymptotic reasoning, though. There are plenty of things in an RPM build that already inherently take O(N) time

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-05 Thread Vitaly Zaitsev via devel
On 04/04/2022 12:34, Fabio Valentini wrote: I wonder, does this have measurable effect on the time it takes to build a package? O(1) -> O(N), where N is the number of files in the RPM package. -- Sincerely, Vitaly Zaitsev (vit...@easycoding.org)

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-05 Thread Miroslav Suchý
Dne 04. 04. 22 v 10:29 Peter Robinson napsal(a): How will this key be distributed on the distro filesystem or on the web? The pub keys will be both, I've added a paragraph to the detailed description. Please add it as TYPE 61 DNS record as well:

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-04 Thread Fabio Valentini
> == Detailed Description == > > During signing builds, the files in it will be signed with IMA signatures. > These signatures will be made with a key that's kept by the Fedora > Infrastructure team, and installed on the sign vaults. I wonder, does this have measurable effect on the time it takes

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-04 Thread Peter Robinson
> > == How To Test == > > You can verify that a signature has been put in place by looking at > > the extended attribute by running: `getfattr -d -m security.ima > > /usr/bin/bash` (change `/usr/bin/bash` with the file to check). > > Can one easily query the RPM archive for the signature blob for

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-03 Thread Peter Robinson
On Sun, Apr 3, 2022 at 11:04 AM Vitaly Zaitsev via devel wrote: > > On 01/04/2022 15:33, Ben Cotton wrote: > > We want to add signatures to individual files that are part of shipped RPMs. > > Third attempt to push it through again? It was already rejected by FESCo. Actually only the second

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-03 Thread Vitaly Zaitsev via devel
On 01/04/2022 15:33, Ben Cotton wrote: We want to add signatures to individual files that are part of shipped RPMs. Third attempt to push it through again? It was already rejected by FESCo. -- Sincerely, Vitaly Zaitsev (vit...@easycoding.org) ___

Re: F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-01 Thread Frank Ch. Eigler
> [...] > == How To Test == > You can verify that a signature has been put in place by looking at > the extended attribute by running: `getfattr -d -m security.ima > /usr/bin/bash` (change `/usr/bin/bash` with the file to check). Can one easily query the RPM archive for the signature blob for

F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-01 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/Signed_RPM_Contents == Summary == We want to add signatures to individual files that are part of shipped RPMs. These signatures will use the Linux IMA (Integrity Measurement Architecture) scheme, which means they can be used to enforce runtime policies to

F37 Change: Signed RPM Contents (System-Wide Change proposal)

2022-04-01 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/Signed_RPM_Contents == Summary == We want to add signatures to individual files that are part of shipped RPMs. These signatures will use the Linux IMA (Integrity Measurement Architecture) scheme, which means they can be used to enforce runtime policies to